We often see super hackers in some Hollywood movie blockbusters, and easily "black" into the security system of others in front of the computer. Wire Straightening And Cutting Machine Steel Straight And Cut Machine is easy to operate and in low price. Wire Straightening And Cutting Machine,Mesh Making Machine,Steel Net Making Machine,Wire Mesh Machine Dovin limited , https://www.dovinmachine.com
Such a scene may also appear in future cars.
As early as last year's Las Vegas hacking conference, two US cyber security personnel demonstrated how to remotely control two cars that were driving by hacking. Their software technology can control the car's steering wheel, allowing it to automatically accelerate or suddenly brake; it also allows the car to brake when driving, no matter how the driver brakes, the car will continue to move forward. But as long as the person in control commands the next one, the car that is driving at a high speed will brake immediately.
According to Luo Yugong, an associate researcher at the Department of Automotive Engineering at Tsinghua University, "hacking cars is inevitable. Because modern cars' drive, braking, steering and other systems are already electronically controlled, they are used in various ways. It can be controlled by its control."
With the wide application of the Zhilian system, how to protect the safety of automotive information has become a topic of concern to everyone.
On the day of the car crack show, BYD urgently shut down the cloud Service On August 21st, the first HackPWN safe geek carnival was held in Beijing. This hacker's carnival event attracted tens of thousands of hackers from all over the world. Among them, car intrusion technology has been closely watched, and the scene is directly a crack show, security experts through the car security loopholes, demonstration of a variety of vehicles including Tesla, BYD, Mercedes-Benz, Chevrolet and so on.
It is understood that the three hackers who cracked the car on the spot were AsafAtzmon, Director of Cisco IoT Security, Yan Wei and Liu Jianhao, founders of the Internet Security Company Visual Threat. They have demonstrated various car network networking cracking technologies, which exist through the car and car system. Security vulnerabilities, control of a variety of cars such as BYD, and explain in detail the loopholes in the car's electronic control system.
Coincidentally, at the opening of HackPWN, car manufacturer BYD urgently issued a notice to users, and will temporarily close the BYD cloud service from 10:00 to 13:00 on August 21. Therefore, this crack security expert can not crack the demonstration control instructions on the spot.
However, according to the video recorded by security expert Liu Jianhao, through the loopholes in BYD, Liu Jianhao can use the mobile phone to open the door, start and drive away, and can also turn on the air conditioner inside the car, or even open or close the trunk, which is not in the mobile APP. The function. In addition, he can send a "suicide" command to BYD to control the car engine causing casualties.
As early as the launch ceremony of HackPWN in June, security experts used the discovered BYD auto cloud service platform vulnerability to successfully use the computer to remotely unlock, whistle, flash, and open the sunroof without the key. It took less than 2 minutes to start the operation and successfully crack it. It is reported that the BYD security vulnerability used in this BYD cloud service system will affect Qin, Si Rui, S7 and the latest Tang and other vehicles equipped with BYD cloud services.
Safety experts said that smart cars provide convenience for people's lives. When the owner goes to work, he can open the car air conditioner remotely in advance and enjoy the comfortable temperature directly after getting on the bus. However, if it is used by criminals to control the oil dial, the error indicates that the remaining oil quantity indicates that it is easy to cause the car to break down during driving, or to implant malware in the car, causing the brake to malfunction and causing casualties.
Is there a major security hole in Model S?
Tesla China President responded to this newspaper US electric vehicle Tesla as a pioneer of Zhilian Automobile, is also frequently "care" by hackers.
Just last month, some media outlets of the Tesla Model S electric car have major security vulnerabilities that can be exploited by hackers. Through this vulnerability, hackers can remotely control the car and even turn the car off. The media reported the news and electric The safety of the car is questioned.
Tesla also made an urgent response to this question. In this statement to the Morning Post reporter, Tesla explained this: "This kind of cracking is based on physical intervention in the vehicle, not remote intrusion. Whether it is the Model S vehicle itself or the Tesla server, Or the mobile app on every owner's mobile phone, Tesla has been repeatedly tested and verified by security. Not only that, but Tesla's advantage of 'vehicle networking' technology, in response to this loophole, Tesla passed the air in the first time. The upgrade (OTA) approach has been patched for all car owners to solve this problem."
At the end of last month, when Zhu Xiaoyu, the president of Tesla China, came to Hangzhou to participate in the new Tesla store, he responded to the Morning Post reporter's car information security concerns.
"The biggest feature of smart cars is the timely intelligent interconnection, so security is a very important part. The confusion caused by this (hacking) may be that people's understanding of smart cars is still limited, and it has not formed a special mainstream. The technical path. In the case of Tesla, the in-vehicle multimedia system and the vehicle control system are two different systems, that is to say, the hidden dangers and the manipulations on the visible system are separate to ensure the safety of the vehicle." Zhu Xiaoyu said.
Zhu Xiaoyu also explained to reporters, "Everyone may also notice that after the 'White Hat' made a proposal, in a very short time, Tesla released an update to all Model S, and quickly repaired and solved this problem through OTA air upgrade. Second system vulnerabilities. This feature is the direction of smart cars in the future, with loopholes for timely feedback and timely upgrades."
"We are very welcome for this kind of communication with hackers or technical research organizations. Just use a candid attitude and don't hide it. Thanks for helping us find these vulnerabilities and provide timely feedback. I believe Tesla uses this. A kind of practical action has also put forward an attempt for this industry." Zhu Xiaoyu said that smart cars must be the future direction, and can not be ruined.
Plan ahead, smart cars also need a "firewall"
In fact, car information security has become more and more important, in addition to embedded software, it is also inseparable from the trend of technology development.
In addition to the functions offered by car manufacturers, there are a wide variety of peripheral products that users purchase and install in their vehicles. While installing these products, threats such as viruses from outside may enter the in-vehicle system, such as smartphones.
At the end of last year, survey information from Nielsen showed that the penetration rate of smartphones among Chinese consumers reached 66%. Using a smartphone means that the car is connected to the external network at any time. Through an external network and a smartphone, an attacker can launch an attack on a moving car. Some applications in the mobile phone have low reliability, and the attacker can use the smart phone to make the in-vehicle device and the car navigation system abnormal, or leak the in-vehicle information and the driver's personal privacy information through the smart phone.
To ensure convenience and security, there are many devices on the car that use network communication. For example, smart key, tire pressure monitoring system (TPMS), and road-to-vehicle communication all use short-range wireless communication functions, which may be subject to potential threats such as eavesdropping and malicious interruption of communication information.
Zhang Jianbo, a professor of automotive at Tsinghua University, said: "Any technology has two sides. Even if there is a hacker attack, people will not dismantle the Internet. Intelligent driving is the general trend of automobile technology development and is irreversible. Now people have to do it, fully absorb the Internet. Lessons to make cars safer and more reliable."
The engineers of SAIC said that the life cycle and life of the car are very long. From the "management", "planning", "development", "use", "discard" and other stages, it is necessary to build a "firewall" for information security.
"Technology is an irresistible future. Although the process of becoming a reality in the future is full of challenges, no one can stop this trend. We only actively respond to challenges and discover and solve these problems more actively and proactively. In order to make more and more technology products that are integrated into our lives better and safer.†In the face of outside doubts, Tesla also said that it has the responsibility and obligation to be more confident in the continuous promotion of smart cars and car networking. Technological advancement and leap.
However, information security is not something that only car developers and producers can do, and its associated industries need to work closely together.